Vulnerability Name: | CVE-2021-23727 (CCN-216459) | ||||||||||||
Assigned: | 2021-12-29 | ||||||||||||
Published: | 2021-12-29 | ||||||||||||
Updated: | 2022-06-14 | ||||||||||||
Summary: | This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-77 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-23727 Source: XF Type: UNKNOWN celery-cve202123727-command-exec(216459) Source: CCN Type: celery GIT Repository celery Source: MISC Type: Broken Link, Release Notes, Third Party Advisory https://github.com/celery/celery/blob/master/Changelog.rst%23522 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-1dae017601 Source: CCN Type: SNYK-PYTHON-CELERY-2314953 Stored Command Injection Source: MISC Type: Exploit, Third Party Advisory https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953 Source: CCN Type: IBM Security Bulletin 6562401 (Spectrum Protect Plus Container Backup and Restore) Vulnerabilities in Celery, Golang Go, and Python affect IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift Source: CCN Type: IBM Security Bulletin 6981595 (Qradar Advisor) Celery as used by IBM QRadar Advisor With Watson App is vulnerable to arbitrary command execution (CVE-2021-23727) Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-23727 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |